Crea il mio profilo
Accesso pubblico
Visualizza tutto37 articoli
29 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongEmail verificata su uow.edu.au
- Yi MuProfessorEmail verificata su cityu.mo
- Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityEmail verificata su smu.edu.sg
- Rongmao Chen (陈荣茂)Associate Professor, National University of Defense TechnologyEmail verificata su nudt.edu.cn
- Li Xu(许力)Fujian Normal UniversityEmail verificata su fjnu.edu.cn
- Nan LiUniversity of WollongongEmail verificata su uow.edu.au
- MINGWU ZHANGHubei University of TechnologyEmail verificata su hbut.edu.cn
- Man Ho AuProfessor, The Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk
- Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongEmail verificata su cityu.edu.hk
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTEmail verificata su tudelft.nl
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityEmail verificata su monash.edu
- Jongkil KimEwha Womans UniversityEmail verificata su ewha.ac.kr
- Jorge MunillaProfessor of Telecommunication Engineering, University of MalagaEmail verificata su ic.uma.es
- Yang-Wai ChowUniversity of WollongongEmail verificata su uow.edu.au
- Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongEmail verificata su uow.edu.au